EP2723139B1 - Verfahren und System zur WLAN-Verbindungssteuerung - Google Patents

Verfahren und System zur WLAN-Verbindungssteuerung Download PDF

Info

Publication number
EP2723139B1
EP2723139B1 EP13188387.8A EP13188387A EP2723139B1 EP 2723139 B1 EP2723139 B1 EP 2723139B1 EP 13188387 A EP13188387 A EP 13188387A EP 2723139 B1 EP2723139 B1 EP 2723139B1
Authority
EP
European Patent Office
Prior art keywords
quality
connection
wlan
server
authentication
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
EP13188387.8A
Other languages
English (en)
French (fr)
Other versions
EP2723139A1 (de
Inventor
Ben Toner
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chemring Technology Solutions Ltd
Original Assignee
Chemring Technology Solutions Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from GB201218641A external-priority patent/GB201218641D0/en
Priority claimed from GBGB1218690.4A external-priority patent/GB201218690D0/en
Application filed by Chemring Technology Solutions Ltd filed Critical Chemring Technology Solutions Ltd
Publication of EP2723139A1 publication Critical patent/EP2723139A1/de
Application granted granted Critical
Publication of EP2723139B1 publication Critical patent/EP2723139B1/de
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/30Connection release
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W84/00Network topologies
    • H04W84/02Hierarchically pre-organised networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
    • H04W84/10Small scale networks; Flat hierarchical networks
    • H04W84/12WLAN [Wireless Local Area Networks]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W24/00Supervisory, monitoring or testing arrangements
    • H04W24/08Testing, supervising or monitoring using real traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/02Access restriction performed under specific conditions
    • H04W48/06Access restriction performed under specific conditions based on traffic conditions

Definitions

  • the present invention relates to a method and system for controlling connections made through wireless local access networks (WLAN), such as IEEE 802.11x (Wi-Fi) networks.
  • WLAN wireless local access networks
  • Specific embodiments are directed at being used with wireless devices which do not provide sufficient user control of the WLAN connection manager, to provide an alternative mechanism for exerting control over which WLAN connections are made or maintained.
  • US 2006/0233114 relates to a wireless diagnostics framework that is non-intrusive and stays out of the way of a user is presented. In the case of a failure, prescriptive guidance is provided and/or the framework possibly automatically fixes the problem.
  • the framework includes a wireless diagnostics module that interacts with the operating system's diagnostics framework, helper classes, and wireless components to collect and log wireless diagnostic events and notifications, and issues queries and requests for active diagnostics.
  • the helper classes perform diagnosis and troubleshooting for their expertise areas based on the information provided by the wireless diagnostics module.
  • the wireless diagnostics module includes an application program interface for communicating with helper classes, an event listener module that provides an event tracing application program interface to in-process modules, an active diagnostics module that issue active packet test requests to a media specific module, and query modules that issue information query requests to media specific modules.
  • EP 2222117 relates to a method for assisting handover of a user terminal's, UT's (240), communication session in an integrated multi RAT network, said method to be carried out by an RNC1 (230) being installed in said network, said method comprising the following steps: - receiving a "Handover Candidate" message comprising a message type identifier information element identifying said message as being a "Handover Candidate” message and which message identifies said session and which message further identifies a candidate RNC (231) of said network, wherein said candidate RNC (231) constitutes an RNC (231) handover candidate for said session, - establishing the identity of said RNC (231) by investigating said message, - associating said communication session with said candidate RNC (231) identified in the previous step.;
  • the invention provides an RNC1 (230), RNC2 (231), and software, realising the method according to the invention.
  • US 2005/0152305 A1 is directed towards a system which uses multi-hop wireless networks to provide network access services.
  • US 2005/0152305 A1 provides a security scheme for multi-hop wireless access networks.
  • the present invention addresses the above noted problems by providing a method and system which provides a degree of proxy control of the WLAN connection of a mobile device by controlling a backend authentication server to either prevent a WLAN session being setup in the presence of unacceptable wireless connectivity conditions, or to de-authenticate an existing session (resulting in session tear-down) if a session already exists but wireless connectivity conditions deteriorate such that they become unacceptable.
  • de-authentication may encompass either complete de-authentication from the entire WLAN network, or where there is a WLAN network consisting of multiple Access Points with the same SSID, the de-authentication may just be the blocking of the device access to that access point.
  • measurement of when wireless connectivity conditions via a particular WLAN are acceptable or unacceptable are made using known and predefined quality metrics, such as packet delay, jitter, and latency.
  • the measurements may be made on the device itself, by a lightweight client application that sits on top of the operating system and monitors the performance of wireless connections that are made by the OS WLAN connection manager.
  • the measurements may be made by the backend authentication server itself, particularly during authentication operations to setup a WLAN session.
  • a dedicated quality server may be provided operated by the WLAN network operator, which provides a public interface, and which may receive via that interface quality metrics from the lightweight client on the device.
  • the quality server then sends instruction messages via a private interface to the back-end authentication server to authenticate/de-authenticate a session.
  • the advantage of having the quality server with the public interface to receive the messages from the device client and a private interface to interact with the authentication server is that security is increased, as the lightweight device client does not need to authenticate itself with the authentication server.
  • embodiments of the invention indirectly control the establishment or continued existence of a WLAN connection by using the back end authentication mechanism to authenticate /de-authenticate a WLAN session in dependence on the experienced quality of the connection during the set-up phase or session itself. This has the effect of preventing a bad quality connection from being established or from continuing, and hence should improve the user experience, and help a WLAN network operator maintain a service with high Quality of Service (QoS).
  • QoS Quality of Service
  • a method of controlling a WLAN connection comprising measuring an experienced quality of the WLAN connection to determine one or more quality metrics relating to the WLAN connection; deciding, using a quality server, whether to de-authenticate a wireless device in dependence on the one or more quality metrics; and using a back-end authentication server to de-authenticate the wireless device using the WLAN connection, if the quality server decides to de-authenticate the wireless device, wherein the de-authentication causes the termination of the WLAN connection
  • Another embodiment also provides a system for controlling a WLAN connection, comprising a quality server arranged to decide whether to de-authenticate a wireless device in dependence on one or more quality metrics; and a back-end authentication server arranged to de-authenticate the wireless device using the WLAN connection if the quality server decides to de-authenticate the wireless device, wherein the de-authentication causes the termination of the WLAN connection.
  • a further embodiment provides a method of controlling a set-up of a wireless local access network (WLAN) connection, the method comprising: establishing an initial connection between a wireless device and a WLAN access point; measuring an experienced quality of the initial connection to determine one or more quality metrics relating to the initial connection; deciding, using a quality server, whether to prevent an authentication process from completing in dependence on the one or more quality metrics; using a back-end authentication server to prevent the authentication process from completing, if the quality server decides to prevent authentication, thereby preventing the set-up of the WLAN connection.
  • WLAN wireless local access network
  • a further embodiment provides a system for controlling a set-up of a wireless local access network (WLAN) connection, the system comprising: a quality server arranged to decide whether to prevent an authentication process from completing in dependence on one or more quality metrics; and a back-end authentication server arranged to prevent the authentication process from completing if the quality server decides to prevent the authentication process from completing, thereby preventing the set-up of the WLAN connection.
  • WLAN wireless local access network
  • Each of the five embodiments make use of the Extensible Authentication Protocol, defined in RFC 3748 and RFC 5247, to allow for authentication of a mobile wireless device 10, such as a smartphone, tablet, laptop, or the like, with a wireless local area (or access) network (WLAN) access point (AP) 20 to enable internet connectivity via the WLAN access point.
  • the WLAN AP 20 is operated by a network operator, which maintains a backend authentication server 30, such as a RADIUS server, to provide authentication and access control mechanisms for the WLAN AP 20.
  • Authentication of the device 10 to obtain connectivity through the WLAN AP 20 is preferably performed between the device 10 and the authentication server 30 using the EAPOL (EAP Over LANS) protocol defined in IEEE 802.1X, although other EAP based protocols may be used depending on the precise application, such as EAP-SIM (defined in RFC 4186), EAP-AKA (defined in RFC 4187), EAP-AKA' (defined in RFC 5448), for example.
  • EAPOL EAP Over LANS
  • EAP-SIM defined in RFC 4186
  • EAP-AKA defined in RFC 4187
  • EAP-AKA' defined in RFC 5448
  • any similar authentication protocol providing similar functionality may be used, and embodiments of the invention are not limited to the above.
  • the WLAN AP 20 typically provides wireless connections commonly known as "Wi-Fi" connections, usually operating in accordance with the IEEE 802.11 family of standards. Sometimes the acronym WLAN is referred to as wireless local area networks; in the context of the present invention these are the same as wireless local access networks,
  • the operation of the authentication protocol used is to permit the device 10 to request authentication and permission to connect to the WLAN AP 20 at step 1.2, and for the WLAN AP 20 to then check that the device is authenticated and permitted to connect via the WLAN AP 20 with the backend authentication server 30, at step 1.4.
  • the precise details of the authentication processes used are beyond the scope of the present specification, but examples are taught in the above noted standards and RFCs.
  • the important operation of the authentication process in the context of the present embodiments, however, is that if, on session set-up the authentication server fails to authenticate the mobile device 10, then the device is refused connection to the WLAN AP 20.
  • a Disconnect or COA (Change of Authorisation) technique as described in RFC 3576 may be utilised. If COA was used, this would prompt re-authentication and to achieve a disconnection attempt the logic in the back-end authentication server (e.g. a Radius server) would be to deny a connection for that user.
  • the logic in the back-end authentication server e.g. a Radius server
  • a second method is to block access of a particular mobile device at a particular access point - this would be a proprietary manufacturer specific implementation
  • FIG. 1 shows a first embodiment of the invention.
  • mobile device 10 wishes to try and set up a connection session with WLAN AP 20, and hence uses the EAP based authentication methods described above at steps 1.2 and 1.4.
  • the backend authentication server 30 receives a request to authenticate the device 10, and commences authentication with the device 10.
  • a timer process is started in the authentication server to measure the time taken for the authentication process, on the basis that if the WLAN connection between the AP and the device is of low quality, throughput across the connection will be low and the authentication process will take longer than usual.
  • the timer process indicates that the time taken to complete the authentication process is longer than usual, or if some other aspect of the message exchange that takes place during the authentication process indicates that the WLAN connection performance is poor (for example if packet delay or jitter is high), then the authentication process is terminated at the backend authentication server end, and the device is prevented from authenticating with and hence connecting to the network. As noted above, this prevents the device from connecting to a poorly performing wireless network (for example because the device is at the edge of the network range), and should cause the device or its user to seek alternative connections.
  • the time measured by the timer process can be an allowable time that is derived from a user preference. For example, if a user wants to save money and use less cellular data, then they will tolerate a slower WLAN connection and so would accept a longer time out. If a user has a plan for speed and unlimited data, then they would likely be less tolerant of slow WLAN and would prefer a shorter timeout.
  • the timeout length measured by the timer process can therefore be set in dependence upon or as a function of a user preference set on the device as to whether they are willing to "accept slow WLAN connections".
  • the opposite functionality is also possible, in that the user preference may be to "use fast WLAN connections", in which case the lower timeout time is used if the preference is selected, and vice versa.
  • the timeout it is possible to assess the timeout according to other networks present to the device.
  • the other network information may come from the device reports of available networks, sent at the time the quality information is sent.
  • knowing the location of the device the operator can infer what other networks are about.
  • the device should only connect to Wi-Fi if it is expected to be at least as good as the fast cellular network such as LTE (depending on the user's spending preferences as described above). If there is no LTE network present, then a longer timeout may be acceptable as a lower quality Wi-Fi connection is usually acceptable when only 3G or 2G networks are the alternative.
  • measurements indicative of the quality of the WLAN connection are taken at the backend authentication server, and if these measurements indicate that the connection is of poor quality, the authentication process is used to refuse a connection of the device to the WLAN. Therefore, whilst the connection manager on the device 10 may not be directly controlled, by refusing connections the device may be indirectly controlled by proxy to select another available connection.
  • FIG. 2 illustrates a further embodiment of the invention.
  • the device 10 attempts (via the WLAN connection manager in the OS) to authenticate with and connect to WLAN AP 20, in the same manner as before.
  • a lightweight WLAN monitoring client application (not shown) is installed on the device, which runs on top of (i.e. outside) the OS, independently of the OS WLAN connection manager, and which acts to monitor attempts to connect and connections made to WLAN networks.
  • the lightweight WLAN monitoring client application starts to measure the time spent in the authentication process, at step 2.1.
  • this measurement is made on the basis that if the WLAN connection between the AP and the device is of low quality, throughput across the connection will be low and the authentication process will take longer than usual. Therefore, if the WLAN monitor process measures that the time taken to complete the authentication process is longer than usual, or if some other aspect of the message exchange that takes place during the authentication process indicates that the WLAN connection performance is poor (for example if packet delay or jitter is high), then the client application sends a message (at step 2.8) to the backend authentication server, instructing the server to prevent the authentication process from completing. As in the first embodiment, this should prevent the device from connecting to the wireless network, and should cause the device or its user to seek alternative connections.
  • measurements indicative of the quality of the WLAN connection are taken at the WLAN monitoring client application running on the mobile device 10, and if these measurements indicate that the connection is of poor quality, the backend authentication process is instructed by the client to refuse a connection of the device to the WLAN. Therefore, whilst the connection manager on the device 10 may not be directly controlled by the WLAN monitoring application, by causing the backend authentication server to refuse connections the device may be indirectly controlled to select another available connection.
  • the backend authentication server 30 lies within the network of the network operator, and for security reasons should not really present any unsecured open public interfaces. Therefore, receiving a message directly from the WLAN monitoring client application on the device should not be allowed in secure implementations, without the client having first to authenticate itself to the backend authentication server. Whilst this is possible, it may itself take quite a bit of time, and may actually prove impossible if the WLAN connection is so bad that the throughput is very low.
  • the embodiment of Figure 3 introduces a quality server 40, operated by the WLAN network operator, and which receives reports with quality metrics from the WLAN monitoring application.
  • the quality metrics may be standard quality metrics, such as packet delay and jitter, as are known in the art.
  • the WLAN monitoring application may send details of other connections or WLAN networks that are available to the device.
  • the quality server 40 decides, on the basis of the quality metrics received, whether the authentication process is taking too long, and if so instructs the back authentication server 30 to refuse to authenticate the device 10. This should then cause the connection attempt to be aborted, and cause the device to seek an alternative connection elsewhere, or to try to connect again at a later time.
  • measurements indicative of the quality of the WLAN connection are taken at the WLAN monitoring client application running on the mobile device 10, and then sent to the quality server.
  • the quality server decides, based on these measurements that the connection is of poor quality, and instructs the backend authentication server to refuse a connection of the device to the WLAN. Therefore, whilst the connection manager on the device 10 may not be directly controlled by the WLAN monitoring application, by causing the backend authentication server to refuse connections the device may be indirectly controlled to select another available connection.
  • using the quality server allows security to be maintained, as the decision to prevent authentication is taken by an entity that is trusted and within the control of the network operator.
  • the previous embodiments focus on when a connection is being set-up.
  • the next embodiments focus on when a connection has already been established, but the connection quality has dropped such that poor quality is obtained. Such an eventuality might arise if, for example, the mobile device has moved location since the connection was first established.
  • the device WLAN monitoring client application retrieves information from an end point.
  • the end point is a web server and the information is HTTP headers that identify the end-point and can carry some information.
  • the information is used to assess quality of the connection, and derive some quality metrics for the connection, such as delay, jitter, and latency, for example. These quality metrics are monitored, and when they reach a threshold indicating poor quality of the connection, or if it is estimated that better quality may be obtained via an alternative connection (such as a cellular connection), then a de-authentication instruction is sent from the client application to the backend authentication server 30.
  • receipt of this instruction causes the backend authentication server to de-authenticate the device, which in turn causes the WLAN AP 20 to tear down the connection session between itself and the device, and hence prevent further connectivity of the device therethrough. As in previous embodiments, this should then cause the connection manager in the OS to seek alternative connections.
  • a quality server 40 is introduced between the client monitoring application and the backend server.
  • the quality server 40 receives quality reports from the client application on the device, and takes decisions based on the quality metrics in the reports. In addition, it also measures quality metrics itself, such as the jitter on the scheduled delivery of the reports.
  • the server decides whether the WLAN connection has degraded to the extent that it is now unacceptable (for example, packet delay and/or jitter exceed known thresholds), and if it is decided that the connection quality is unacceptable an instruction is sent to the backend authentication server to de-authenticate the device. As before, this causes the WLAN AP 20 to tear down the connection session between itself and the device, and hence prevent further connectivity of the device therethrough. As in previous embodiments, this should then cause the connection manager in the OS to seek alternative connections.
  • one version of the fifth embodiment operates as follows:
  • the fifth embodiment therefore provides the advantages of the fourth embodiment, but with the security advantages of the quality server, which means that the authentication server need not have any open, unsecured interfaces.
  • embodiments of the invention make use of the authentication mechanism used in some WLAN arrangements to indirectly control the connections that a wireless device makes, by either refusing to authenticate the device or de-authenticating a device which is suffering from a poor quality WLAN connection. This therefore forces the device the seek an alternative connection, which may be a cellular connection, or alternative WLAN.
  • the advantage of the invention is that is allows a WLAN operator to manage any mobile device Wi-Fi access dynamically to always offer the best network connection. With this concept, there is a separation in the ownership of user experience between the device manufacturer and the network operator.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Claims (12)

  1. Verfahren zur Steuerung einer drahtlosen lokalen Netzwerk(WLAN)-Verbindung, umfassend
    - Messen einer wahrgenommenen Güte der WLAN-Verbindung zur Bestimmung einer oder mehrerer auf die WLAN-Verbindung bezogenen Gütemetriken,
    - Entscheiden, ob ein drahtloses Gerät (10) abhängig von der einen oder den mehreren Gütemetriken deauthentifiziert werden soll, unter Verwendung eines Güteservers (40),
    - Verwenden eines Backend-Authentifikationsservers (30) zum Deauthentifizieren des die WLAN-Verbindung nutzenden drahtlosen Geräts (10), wenn der Güteserver entscheidet, das drahtlose Gerät zu deauthentifizieren, wobei das Deauthentifizieren zum Abbruch der WLAN-Verbindung führt.
  2. Verfahren nach Anspruch 1, wobei die Gütemetriken Paketverzögerung, Jitter, Latenzzeit und/oder die für die Fertigstellung eines Authentifizierungsvorgangs nötige Zeit umfassen.
  3. Verfahren nach einem der vorangehenden Ansprüche, umfassend
    - Senden einer Anweisung zum Deauthentifizieren des drahtlosen Geräts an den Backend-Authentifi kationsserver.
  4. Verfahren nach einem der Ansprüche 1 bis 3, umfassend
    - Messen der wahrgenommenen Güte am drahtlosen Gerät zur Bestimmung mindestens einer der auf die WLAN-Verbindung bezogenen Gütemetriken und
    - Senden der einen oder der mehreren Gütemetriken an den Güteserver.
  5. Verfahren nach einem der vorangehenden Ansprüche, wobei das Verfahren während einer Verbindungsphase angewendet wird, sobald eine Verbindungssitzung besteht, um zu bestimmen, ob die Sitzung beendet werden soll.
  6. System zur Steuerung einer drahtlosen lokalen Netzwerk(WLAN)-Verbindung , umfassend
    - einen Güteserver (40), eingerichtet zum Entscheiden, ob ein drahtloses Gerät (10) abhängig von einer oder mehreren Gütemetriken deauthentifiziert werden soll und
    - einen Backend-Authentifikationsserver (30), eingerichtet zum Deauthentifizieren des die WLAN-Verbindung nutzenden drahtlosen Geräts (10), wenn der Güteserver entscheidet, das drahtlose Gerät zu deauthentifizieren, wobei das Deauthentifizieren zum Abbruch der WLAN-Verbindung führt.
  7. System nach Anspruch 6, wobei das System ferner umfasst
    - einen Gütemetrikrechner, eingerichtet zum Bestimmen der einen oder der mehreren auf die WLAN-Verbindung bezogenen Gütemetriken,
    - wobei die Gütemetriken die wahrgenommene Güte der Verbindung anzeigen.
  8. System nach einem der Ansprüche 6 oder 7, umfassend
    - einen Gütemetrikrechner, eingerichtet zum Messen der wahrgenommenen Güte zum Bestimmen einer oder mehrerer auf die WLAN-Verbindung bezogenen Gütemetriken und
    - ein Message-Interface, eingerichtet zum Senden der Gütemetriken an den Güteserver (40), welcher abhängig von den empfangenen Gütemetriken entscheidet, das drahtlose Gerät (10) zu deauthentifizieren.
  9. System nach einem der Ansprüche 7 oder 8, wobei die Gütemetriken Paketverzögerung, Jitter, Latenzzeit und/oder die für die Erledigung eines Authentifizierungsvorgangs nötige Zeit umfassen.
  10. System nach einem der Ansprüche 6 bis 9, wobei das System während einer Verbindungsphase angewendet wird, sobald eine Verbindungssitzung besteht, um zu bestimmen, ob die Sitzung beendet werden soll.
  11. Verfahren zur Steuerung der Einrichtung einer drahtlosen lokalen Netzwerk(WLAN)-Verbindung, umfassend
    - Herstellen einer Erstverbindung zwischen einem drahtlosen Gerät (10) und einem WLAN-Zugangspunkt (20) durch Senden einer Anforderung auf Authentifizierung und Erlaubnis zur Verbindung mit dem WLAN-Zugangspunkt vom drahtlosen Gerät (10) zum Backend-Authentifikationsserver (30),
    - Messen einer wahrgenommenen Güte der Erstverbindung zur Bestimmung einer oder mehrerer auf die Erstverbindung bezogenen Gütemetriken,
    - Entscheiden, ob die Fertigstellung des Authentifizierungsvorgangs abhängig von der einen oder den mehreren Gütemetriken verhindert werden soll, unter Verwendung eines Güteservers (40),
    - Verwenden eines Backend-Authentifikationsservers (30) zum Verhindern der Fertigstellung des Authentifizierungsvorgangs, wenn der Güteserver entscheidet, die Authentifizierung zu verhindern, wodurch die Einrichtung der WLAN-Verbindung verhindert wird.
  12. System zur Steuerung der Einrichtung einer drahtlosen lokalen Netzwerk(WLAN)-Verbindung, umfassend
    - einen Güteserver (40), eingerichtet zum Entscheiden, ob die Fertigstellung eines Authentifizierungsvorgangs abhängig von der einen oder den mehreren Gütemetriken verhindert werden soll, und
    - einen Backend-Authentifikationsserver (30), eingerichtet zum Verhindern der Fertigstellung des Authentifizierungsvorgangs, wenn der Güteserver entscheidet, die Fertigstellung des Authentifizierungsvorgangs zu verhindern, wodurch die Einrichtung der WLAN-Verbindung verhindert wird.
EP13188387.8A 2012-10-16 2013-10-11 Verfahren und System zur WLAN-Verbindungssteuerung Active EP2723139B1 (de)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
GB201218641A GB201218641D0 (en) 2012-10-16 2012-10-16 Method and system for WLAN connection control
GBGB1218690.4A GB201218690D0 (en) 2012-10-17 2012-10-17 Method and system WLAN connection control

Publications (2)

Publication Number Publication Date
EP2723139A1 EP2723139A1 (de) 2014-04-23
EP2723139B1 true EP2723139B1 (de) 2017-05-24

Family

ID=49328412

Family Applications (1)

Application Number Title Priority Date Filing Date
EP13188387.8A Active EP2723139B1 (de) 2012-10-16 2013-10-11 Verfahren und System zur WLAN-Verbindungssteuerung

Country Status (5)

Country Link
US (1) US9380633B2 (de)
EP (1) EP2723139B1 (de)
CA (1) CA2829877C (de)
GB (1) GB2507653B (de)
IN (1) IN2013DE03065A (de)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110128972A1 (en) 2000-04-17 2011-06-02 Randy Thornton Peer to peer dynamic network link acceleration
US8996705B2 (en) 2000-04-17 2015-03-31 Circadence Corporation Optimization of enhanced network links
US7127518B2 (en) 2000-04-17 2006-10-24 Circadence Corporation System and method for implementing application functionality within a network infrastructure
WO2015191008A1 (en) * 2014-06-13 2015-12-17 Mediatek Singapore Pte. Ltd. Basic service set load management
US10448314B2 (en) * 2017-12-07 2019-10-15 Symbol Technologies, Llc Methods and systems for mitigating connection impact on network infrastructure

Family Cites Families (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP3563714B2 (ja) 2001-08-08 2004-09-08 株式会社東芝 ネットワーク間接続装置
US20050152305A1 (en) * 2002-11-25 2005-07-14 Fujitsu Limited Apparatus, method, and medium for self-organizing multi-hop wireless access networks
JP4290967B2 (ja) * 2002-11-26 2009-07-08 Necインフロンティア株式会社 無線LANネットワークQoS制御システム、基地局、端末、QoS制御方法およびプログラム
CN100395982C (zh) 2003-10-24 2008-06-18 华为技术有限公司 无线局域网预付费计费系统及其方法
US7450552B2 (en) * 2004-07-02 2008-11-11 Tropos Networks, Inc. Access point control of client roaming
US7669085B2 (en) * 2005-04-15 2010-02-23 Microsoft Corporation Method and apparatus for performing wireless diagnostics and troubleshooting
CN101273650B (zh) * 2005-09-30 2012-01-11 艾利森电话股份有限公司 改进集成无线电接入网络的切换特性的装置和方法
KR100738545B1 (ko) * 2005-12-29 2007-07-11 삼성전자주식회사 무선랜 서비스 타입에 따른 큐오에스 보장 시스템 및 그방법
US7903817B2 (en) * 2006-03-02 2011-03-08 Cisco Technology, Inc. System and method for wireless network profile provisioning
US8971883B2 (en) * 2006-11-07 2015-03-03 Qualcomm Incorporated Registration timer adjustment based on wireless network quality
US7961684B2 (en) * 2007-07-13 2011-06-14 Intel Corporation Fast transitioning resource negotiation
CA2717327C (en) * 2009-10-11 2015-08-04 Research In Motion Limited Authentication failure in a wireless local area network
WO2012106330A1 (en) * 2011-01-31 2012-08-09 Synchronoss Technologies, Inc. System and method for host and os agnostic management of connected devices through network controlled state alteration

Also Published As

Publication number Publication date
EP2723139A1 (de) 2014-04-23
CA2829877C (en) 2020-08-11
GB2507653B (en) 2015-01-28
US9380633B2 (en) 2016-06-28
IN2013DE03065A (de) 2015-06-19
GB201318063D0 (en) 2013-11-27
CA2829877A1 (en) 2014-04-16
US20140105051A1 (en) 2014-04-17
GB2507653A (en) 2014-05-07

Similar Documents

Publication Publication Date Title
US20220045899A1 (en) Method and apparatus for providing notification of detected error conditions in a network
US9867044B2 (en) Method and apparatus for security configuration and verification of wireless devices in a fixed/mobile convergence environment
EP3120515B1 (de) Verbesserter end-zu-end-datenschutz
EP2723139B1 (de) Verfahren und System zur WLAN-Verbindungssteuerung
EP2624522B1 (de) Ermöglichung des nahtlosen Entlastung zwischen zwei drahtlosen lokalen Netzwerken in festen mobilen Konvergenz-Systemen
TW201632020A (zh) 使用安全態勢資訊決定服務存取
WO2005027557A1 (en) Seamless handover in heterogeneous network
EP2534878A1 (de) Umleitung von datenverkehr zwischen wan und lan
JP7139434B2 (ja) Rrcコネクション再開時のセキュリティ検証
US20050132214A1 (en) Authentication for transmission control protocol
US9420460B2 (en) WLAN authentication restriction
JP4527553B2 (ja) 携帯通信端末およびユーザ認証方法
US10674362B2 (en) Notifying the HSS of failure of connectivity request for a packet data session
WO2013096938A1 (en) Method and apparatus for load transfer
WO2017132906A1 (zh) 获取、发送用户设备标识的方法及设备
US20230354083A1 (en) Identification of cascaded multi-connectivity and mitigation of cascaded multi-connectivity interference effects
WO2023052833A1 (en) Transport layer security (tls) authentication based on hash of expected certificate
WO2010105438A1 (zh) 网络自优化的方法、设备及系统

Legal Events

Date Code Title Description
PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

AK Designated contracting states

Kind code of ref document: A1

Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR

AX Request for extension of the european patent

Extension state: BA ME

17P Request for examination filed

Effective date: 20141022

RBV Designated contracting states (corrected)

Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR

17Q First examination report despatched

Effective date: 20151030

RAP1 Party data changed (applicant data changed or rights of an application transferred)

Owner name: CHEMRING TECHNOLOGY SOLUTIONS LIMITED

GRAP Despatch of communication of intention to grant a patent

Free format text: ORIGINAL CODE: EPIDOSNIGR1

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: GRANT OF PATENT IS INTENDED

INTG Intention to grant announced

Effective date: 20161207

GRAS Grant fee paid

Free format text: ORIGINAL CODE: EPIDOSNIGR3

GRAA (expected) grant

Free format text: ORIGINAL CODE: 0009210

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE PATENT HAS BEEN GRANTED

RBV Designated contracting states (corrected)

Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR

RIN1 Information on inventor provided before grant (corrected)

Inventor name: TONER, BEN

AK Designated contracting states

Kind code of ref document: B1

Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR

REG Reference to a national code

Ref country code: CH

Ref legal event code: EP

REG Reference to a national code

Ref country code: IE

Ref legal event code: FG4D

REG Reference to a national code

Ref country code: AT

Ref legal event code: REF

Ref document number: 896579

Country of ref document: AT

Kind code of ref document: T

Effective date: 20170615

REG Reference to a national code

Ref country code: DE

Ref legal event code: R096

Ref document number: 602013021480

Country of ref document: DE

REG Reference to a national code

Ref country code: NL

Ref legal event code: MP

Effective date: 20170524

REG Reference to a national code

Ref country code: LT

Ref legal event code: MG4D

REG Reference to a national code

Ref country code: AT

Ref legal event code: MK05

Ref document number: 896579

Country of ref document: AT

Kind code of ref document: T

Effective date: 20170524

REG Reference to a national code

Ref country code: FR

Ref legal event code: PLFP

Year of fee payment: 5

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: AT

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20170524

Ref country code: NO

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20170824

Ref country code: FI

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20170524

Ref country code: ES

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20170524

Ref country code: GR

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20170825

Ref country code: LT

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20170524

Ref country code: HR

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20170524

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: IS

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20170924

Ref country code: SE

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20170524

Ref country code: BG

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20170824

Ref country code: LV

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20170524

Ref country code: NL

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20170524

Ref country code: RS

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20170524

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: EE

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20170524

Ref country code: RO

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20170524

Ref country code: CZ

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20170524

Ref country code: DK

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20170524

Ref country code: SK

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20170524

REG Reference to a national code

Ref country code: DE

Ref legal event code: R097

Ref document number: 602013021480

Country of ref document: DE

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: SM

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20170524

Ref country code: PL

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20170524

Ref country code: IT

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20170524

PLBE No opposition filed within time limit

Free format text: ORIGINAL CODE: 0009261

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: NO OPPOSITION FILED WITHIN TIME LIMIT

26N No opposition filed

Effective date: 20180227

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: MC

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20170524

Ref country code: SI

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20170524

REG Reference to a national code

Ref country code: CH

Ref legal event code: PL

REG Reference to a national code

Ref country code: IE

Ref legal event code: MM4A

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: CH

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20171031

Ref country code: LU

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20171011

Ref country code: LI

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20171031

REG Reference to a national code

Ref country code: BE

Ref legal event code: MM

Effective date: 20171031

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: BE

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20171031

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: MT

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20171011

REG Reference to a national code

Ref country code: FR

Ref legal event code: PLFP

Year of fee payment: 6

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: IE

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20171011

REG Reference to a national code

Ref country code: DE

Ref legal event code: R082

Ref document number: 602013021480

Country of ref document: DE

Representative=s name: DEHNS, DE

Ref country code: DE

Ref legal event code: R081

Ref document number: 602013021480

Country of ref document: DE

Owner name: CT-SMARTSWITCH LLC (N.D.GES. DES STAATES DELAW, US

Free format text: FORMER OWNER: CHEMRING TECHNOLOGY SOLUTIONS LIMITED, ROMSEY, HAMPSHIRE, GB

Ref country code: DE

Ref legal event code: R082

Ref document number: 602013021480

Country of ref document: DE

Representative=s name: DEHNS PATENT AND TRADEMARK ATTORNEYS, DE

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: HU

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT; INVALID AB INITIO

Effective date: 20131011

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: CY

Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES

Effective date: 20170524

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: MK

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20170524

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: TR

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20170524

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: PT

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20170524

PG25 Lapsed in a contracting state [announced via postgrant information from national office to epo]

Ref country code: AL

Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT

Effective date: 20170524

PGFP Annual fee paid to national office [announced via postgrant information from national office to epo]

Ref country code: FR

Payment date: 20231025

Year of fee payment: 11

Ref country code: DE

Payment date: 20231027

Year of fee payment: 11